Claude HUD Command Injection Vulnerability via COMSPEC Manipulation (CVE-2026-47092)
Claude HUD through version 0.0.12 is vulnerable to command injection (CVE-2026-47092) allowing a local attacker to execute arbitrary commands on a Windows system by manipulating the COMSPEC environment variable; this vulnerability has been patched in commit 234d9aa.
Claude HUD through version 0.0.12, patched in commit 234d9aa, contains a command injection vulnerability (CVE-2026-47092). A local attacker can exploit this flaw by manipulating the COMSPEC environment variable. Specifically, the application performs a version check using execFile(). If the attacker sets COMSPEC to an arbitrary binary path prior to this check, the attacker-supplied executable will be executed with cmd.exe arguments. This allows for arbitrary code execution on vulnerable Windows systems. This vulnerability matters to defenders because it allows an attacker to gain unauthorized access and control over affected systems, potentially leading to data breaches, system compromise, or other malicious activities.
Attack Chain
- The attacker gains local access to the target Windows system.
- The attacker identifies that Claude HUD version 0.0.12 or earlier is installed.
- The attacker modifies the COMSPEC environment variable to point to a malicious executable. For example, they might set
COMSPEC=C:\evil\malware.exe. - The attacker triggers the Claude HUD application, which initiates its version check.
- The
execFile()function is called to execute the version check. Due to the manipulated COMSPEC variable, the attacker-controlled executable (C:\evil\malware.exein this example) is executed instead of the intended command. - The malicious executable runs with the privileges of the user running Claude HUD.
- The attacker gains arbitrary code execution on the system.
Impact
Successful exploitation of this command injection vulnerability (CVE-2026-47092) allows a local attacker to execute arbitrary commands on the targeted Windows system. This can lead to a complete compromise of the system, including unauthorized access to sensitive data, installation of malware, or further lateral movement within the network. The NVD assigned this vulnerability a CVSS v3.1 score of 7.8, indicating a high severity.
Recommendation
- Apply the patch provided in commit 234d9aa to remediate the vulnerability.
- Implement the following Sigma rule to detect suspicious modifications to the COMSPEC environment variable.
- Deploy the Sigma rule to your SIEM and tune for your environment.
- Monitor process creation events for execution of unusual binaries from non-standard locations when Claude HUD is run.
Detection coverage 2
Detect COMSPEC Environment Variable Modification
mediumDetects modifications to the COMSPEC environment variable, which can be indicative of command injection attempts like CVE-2026-47092.
Detect Suspicious Process Execution via Modified COMSPEC
highDetects process execution of unusual executables via cmd.exe based on a non-standard COMSPEC variable, potentially indicating CVE-2026-47092 exploitation.
Detection queries are available on the platform. Get full rules →